0
Close menu
SmartSellTM - The New Way to sell Online
we won't be beaten by anyone
Categories
Books
Music
Movies & TV
Daily Deals
Best Sellers
🎁 Gift Finder
Track My Order
Sign in
Register
Wishlist
Cart
0
HKD
Sign in
Join
Browse
Wishlist
Help
All Products
Books
Movies
Music
All Products
\n
Books
Movies
Music
All Products
Warehouse Stock Clearance Sale
Grab a bargain today!
Categories
Daily Deals
Best Sellers
🎁 Gift Finder
Books
Music
Movies & TV
Track My Order
Sign in
Register
Wishlist
0
Cart
HKD
Search
Filters
Refine By
Category
Category
Books
(181)
Toys
(1)
Sold By
Sold By
All Sellers
Fishpond
(181)
Brand
Brand
All Brands
Routledge
(20)
Humana Press Inc.
(17)
Springer
(17)
Springer-Verlag New York Inc.
(13)
Springer Verlag, Singapore
(9)
More...
Format
Format
All Formats
Hardback
(350)
Paperback
(181)
Audio CD
(2)
Blu-ray
(2)
DVD
(2)
More...
Age Range
Age Range
All Ranges
15+
(2)
All Ages
(9)
Country
Country
All Countries
United States
(82)
United Kingdom
(42)
Switzerland
(16)
Singapore
(14)
Germany
(8)
More...
Results for "Peng Liu"
Peng Liu
253 results
Filters
Refine By
Category
Category
Books
(181)
Toys
(1)
Sold By
Sold By
All Sellers
Fishpond
(181)
Brand
Brand
All Brands
Routledge
(20)
Humana Press Inc.
(17)
Springer
(17)
Springer-Verlag New York Inc.
(13)
Springer Verlag, Singapore
(9)
More...
Format
Format
All Formats
Hardback
(350)
Paperback
(181)
Audio CD
(2)
Blu-ray
(2)
DVD
(2)
More...
Age Range
Age Range
All Ranges
15+
(2)
All Ages
(9)
Country
Country
All Countries
United States
(82)
United Kingdom
(42)
Switzerland
(16)
Singapore
(14)
Germany
(8)
More...
253 results
Sort By
Bestselling
Relevance
Price: Lowest
Bestselling
Relevance
Price: Lowest
Sort By
View:
Safe Search(
?
):
Quantitative Trading Strategies Using Python (Technical Analysis, Statistical Testing, and Machine Learning)
By
Peng Liu
Quantitative Trading Strategies Using Python (Technical Analysis, Statistical Testing, and Machine Learning)
By
Peng Liu
HK$380
Chinese Cooperative-Harmonious Democracy (China Perspectives)
By
Zongchao Peng
,
Ben Ma
,
Taoxiong Liu
Chinese Cooperative-Harmonious Democracy (China Perspectives)
By
Zongchao Peng
,
Ben Ma
,
Taoxiong Liu
HK$238
Elsewhere
HK$370.59
Save HK$132.59 (36%)
Security for Wireless Sensor Networks (Advances in Information Security)
By
Ning, Peng
,
Liu, Donggang
Security for Wireless Sensor Networks (Advances in Information Security)
By
Ning, Peng
,
Liu, Donggang
HK$1,074
Elsewhere
HK$1,302.31
Save HK$228.31 (18%)
Trusted Recovery and Defensive Information Warfare (Advances in Information Security)
By
Jajodia, Sushil
,
Peng Liu
Trusted Recovery and Defensive Information Warfare (Advances in Information Security)
By
Jajodia, Sushil
,
Peng Liu
HK$875
Cyber Situational Awareness (Issues and Research (Advances in Information Security))
By
Sushil Jajodia
,
Peng Liu
,
Vipin Swarup
,
Cliff Wang
Cyber Situational Awareness (Issues and Research (Advances in Information Security))
By
Sushil Jajodia
,
Peng Liu
,
Vipin Swarup
,
Cliff Wang
HK$900
Bayesian Optimization (Theory and Practice Using Python)
By
Liu, Peng
Bayesian Optimization (Theory and Practice Using Python)
By
Liu, Peng
HK$415
Elsewhere
HK$550.92
Save HK$135.92 (25%)
Educational Leadership and Asian Culture (Culturally Sensitive Leadership Practice (Routledge Research in Educational Leadership))
By
Peng Liu
,
Lei Mee Thien
Educational Leadership and Asian Culture (Culturally Sensitive Leadership Practice (Routledge Research in Educational Leadership))
By
Peng Liu
,
Lei Mee Thien
HK$302
Elsewhere
HK$390.62
Save HK$88.62 (23%)
Computational Advertising (Market and Technologies for Internet Commercial Monetization)
By
Peng Liu
,
Chao Wang
Computational Advertising (Market and Technologies for Internet Commercial Monetization)
By
Peng Liu
,
Chao Wang
HK$454
Male Idols and Branding in Chinese Luxury (Fashion, Cosmetics, and Popular Culture)
By
Amanda Sikarskie
,
Lan Lan
,
Peng Liu
Male Idols and Branding in Chinese Luxury (Fashion, Cosmetics, and Popular Culture)
By
Amanda Sikarskie
,
Lan Lan
,
Peng Liu
HK$352
Ecological Environment Design Under the Circular Economy Mode
By
Jing Peng
,
Xiuzhen Liu
,
Zhijing Yu
Ecological Environment Design Under the Circular Economy Mode
By
Jing Peng
,
Xiuzhen Liu
,
Zhijing Yu
HK$168
Theory and Models for Cyber Situation Awareness (Programming and Software Engineering)
By
Peng Liu
,
Sushil Jajodia
,
Cliff Wang
Theory and Models for Cyber Situation Awareness (Programming and Software Engineering)
By
Peng Liu
,
Sushil Jajodia
,
Cliff Wang
HK$533
Graphical Models for Security (4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers (Lecture Notes in Computer Science))
By
Peng Liu
,
Sjouke Mauw
,
Ketil Stolen
Graphical Models for Security (4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers (Lecture Notes in Computer Science))
By
Peng Liu
,
Sjouke Mauw
,
Ketil Stolen
HK$407
The Statistics and Machine Learning with R Workshop (Unlock the power of efficient data science modeling with this hands-on guide)
By
Liu Peng
The Statistics and Machine Learning with R Workshop (Unlock the power of efficient data science modeling with this hands-on guide)
By
Liu Peng
HK$497
Security and Privacy in New Computing Environments (Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13-14, 2019, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineerin)
By
Jin Li
,
Zheli Liu
,
Hao Peng
Security and Privacy in New Computing Environments (Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13-14, 2019, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineerin)
By
Jin Li
,
Zheli Liu
,
Hao Peng
HK$600
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense (Control- and Game-Theoretic Approaches to Cyber Security (Security and Cryptology) (Lecture Notes in Computer Science))
By
Sushil Jajodia
,
George Cybenko
,
Peng Liu
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense (Control- and Game-Theoretic Approaches to Cyber Security (Security and Cryptology) (Lecture Notes in Computer Science))
By
Sushil Jajodia
,
George Cybenko
,
Peng Liu
HK$537
Pattern Recognition and Computer Vision (Third Chinese Conference, PRCV 2020, Nanjing, China, October 16–18, 2020, Proceedings, Part I (Lecture Notes in Computer Science) (Image Processing, Computer Vision, Pattern Recognition, and Graphics))
By
Yuxin Peng
,
Qingshan Liu
,
Huchuan Lu
,
Zhenan Sun
Pattern Recognition and Computer Vision (Third Chinese Conference, PRCV 2020, Nanjing, China, October 16–18, 2020, Proceedings, Part I (Lecture Notes in Computer Science) (Image Processing, Computer Vision, Pattern Recognition, and Graphics))
By
Yuxin Peng
,
Qingshan Liu
,
Huchuan Lu
,
Zhenan Sun
HK$1,034
Pattern Recognition and Computer Vision (Third Chinese Conference, PRCV 2020, Nanjing, China, October 16–18, 2020, Proceedings, Part III (Image Processing, Computer Vision, Pattern Recognition, and Graphics) (Lecture Notes in Computer Science))
By
Yuxin Peng
,
Qingshan Liu
,
Huchuan Lu
,
Zhenan Sun
Pattern Recognition and Computer Vision (Third Chinese Conference, PRCV 2020, Nanjing, China, October 16–18, 2020, Proceedings, Part III (Image Processing, Computer Vision, Pattern Recognition, and Graphics) (Lecture Notes in Computer Science))
By
Yuxin Peng
,
Qingshan Liu
,
Huchuan Lu
,
Zhenan Sun
HK$540
Pattern Recognition and Computer Vision (Third Chinese Conference, PRCV 2020, Nanjing, China, October 16–18, 2020, Proceedings, Part II (Image Processing, Computer Vision, Pattern Recognition, and Graphics) (Lecture Notes in Computer Science))
By
Yuxin Peng
,
Qingshan Liu
,
Huchuan Lu
,
Zhenan Sun
Pattern Recognition and Computer Vision (Third Chinese Conference, PRCV 2020, Nanjing, China, October 16–18, 2020, Proceedings, Part II (Image Processing, Computer Vision, Pattern Recognition, and Graphics) (Lecture Notes in Computer Science))
By
Yuxin Peng
,
Qingshan Liu
,
Huchuan Lu
,
Zhenan Sun
HK$1,000
Data and Applications Security (20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings: v. 20 (Lecture Notes in Computer Science / Information Systems and Applications,)
By
Ernesto Damiani
,
Peng Liu
Data and Applications Security (20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings: v. 20 (Lecture Notes in Computer Science / Information Systems and Applications,)
By
Ernesto Damiani
,
Peng Liu
HK$537
Adaptive Intrusion Tolerant Database Systems
By
Pramote Luenam
,
Peng Liu
,
Anthony F. Norcio
Adaptive Intrusion Tolerant Database Systems
By
Pramote Luenam
,
Peng Liu
,
Anthony F. Norcio
HK$575
Information Security and Cryptology (4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers (Lecture Notes in Computer Science))
By
Moti Yung
,
Peng Liu
,
Dongdai Lin
Information Security and Cryptology (4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers (Lecture Notes in Computer Science))
By
Moti Yung
,
Peng Liu
,
Dongdai Lin
HK$536
Massive MIMO Detection Algorithm and VLSI Architecture
By
Leibo Liu
,
Guiqiang Peng
,
Shaojun Wei
Massive MIMO Detection Algorithm and VLSI Architecture
By
Leibo Liu
,
Guiqiang Peng
,
Shaojun Wei
HK$900
Profound Changes Unseen in Centuries (An Overview of China (Understanding China))
By
Wen Wang
,
Jinjing Jia
,
Yushu Liu
,
Peng Wang
Profound Changes Unseen in Centuries (An Overview of China (Understanding China))
By
Wen Wang
,
Jinjing Jia
,
Yushu Liu
,
Peng Wang
HK$984
1
2
3
4
5
6
7
8
9
10
Next Page
1
2
3
4
5
6
7
8
9
10
Next Page